Our privacy: How to be assured in cyberspace
We have tonnes of confidential information digitised and stored in every possible storage media in cyberspace, via both popular applications, being direct cloud-based services and/or social media platform, and applications that are designed for a specific group of professionals. However, one questio...
Saved in:
Main Author: | Zulhuda, Sonny |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
2016
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/51210/1/ISACA_CIAG_2016.pdf http://irep.iium.edu.my/51210/7/51210.pdf http://irep.iium.edu.my/51210/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Utilization of cyberspace by terrorist groups and the applicability of the Malaysian law on terrorism
by: Labanieh, Mohamad Fateh, et al.
Published: (2016) -
Right to privacy: development, cases and commentaries
by: Zulhuda, Sonny
Published: (2013) -
Cybersecurity and privacy
by: Zulhuda, Sonny
Published: (2020) -
Privacy in cyber era : a reality check
by: Zulhuda, Sonny
Published: (2012) -
Embracing cyberspace: Malaysia and the cyber security initiatives
by: Zulhuda, Sonny
Published: (2023)